Sat.Aug 16, 2014 - Fri.Aug 22, 2014

article thumbnail

Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?

CTOvision

'By Bob Gourley. The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority , mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their ineptitude (from Wikipedia ). . The phenomenon was first tested in a series of experiments published in 1999 by David Dunning and Justin Kruger of the Department of Psychology, Cornell University.

Strategy 409
article thumbnail

Speaker on Cooling Trends: Innovative Economization Increases ROI

Data Center Knowledge

'Cooling is changing in the data center, and the latest technological advances, while not implemented universally yet, are making headway in specific instances in the data center space. Scot Heath, an engineer with CLEAResult, was asked about the present and future state of cooling in the data.

Trends 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why is Data Sooo Messy and How to Avoid Data Landfills

Social, Agile and Transformation

'I was surprised this morning to see an article about the "janitorial" work data scientists have to perform to be able to find "nuggets" in big data. Actually, my only surprise is that the story is in the NY Times and that they are covering the least glamorous side of the "sexiest" job. Why is data so messy? Let''s start with the past. The history of data science starts with complicated.

Data 242
article thumbnail

Avon’s US$125M IT Software Project Mistake

The Accidental Successful CIO

'Avon made a big mistake when they designed their new software Image Credit. As CIO we have a number of different tasks that the company is expecting us to do. However, there is one task that takes priority over all of these other takes: implementing large software projects. Over at Avon they just did one of these big projects and it has ended in failure.

Software 185
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ensure Your Command Center/Ops Center Stays Relevant By Leveraging Wayin: See video of this broadcast media use case

CTOvision

'By Bob Gourley. We have previously written about Wayin (I am proud to be one of their advisors). Their capabilities continue to evolve to enable organizations to continually improve how social media is used to both understand and engage. Wayin’s success in the marketplace has centered around sensemaking over social data in ways that can improve the value delivered to consumers and clients.

Media 325
article thumbnail

OpenStack’s Search for True Self

Data Center Knowledge

'With the number of clouds referred to as "OpenStack clouds" growing, the OpenStack Foundation is on a quest to define what technologies actually qualify to use the trademark. Read More.

Cloud 251

More Trending

article thumbnail

PowerShell: Enable Bitlocker on a Dell System

Mick's IT Blog

'After much research and troubleshooting, here is how to enable bitlocker on a Dell system, including clearing the TPM. The documentation by Dell , Trusted Computing Group , and advice from this thread and this one say that it must be done with physical presence through the BIOS screen. There is a way to do this without having to go through the BIOS.

Dell 100
article thumbnail

Open Frameworks Around Pentaho Providing Blueprints for Big Data Success

CTOvision

'By Bob Gourley. Enterprises everywhere have been seeking improved ways to make use of their data. Federal agencies have in many ways been on the cutting edge of community efforts at big data, with most all agencies either executing on a comprehensive big data strategy or empowering technologist to explore and prove out possible solutions so a strategy can be developed.

Big Data 289
article thumbnail

Geodesic Dome Makes Perfect Data Center Shell in Oregon

Data Center Knowledge

'Designer of new OHSU data center finds half-sphere structure optimal for cooling, space efficiency and seismic stability. Read More.

article thumbnail

Big Data, Icebergs and Janitor Work

Eric D. Brown

'Welcome to the sexy world of big data. A world in which data scientists make bold predictions about the future of business. They make millions of dollars and spend their days jet-setting around the world answering the call of ‘big data’ So…maybe it really isn’t all that sexy. Data scientists might make decent money but most aren’t flying around the world “jet-setting” Most data scientists are sitting in a room somewhere staring at their computer screens

Big Data 154
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MDT: Windows Could Not parse or process unattend answer file for pass

Mick's IT Blog

'This error message was caused, at least in my situation, by the addition of Internet Explorer 11 into the build. It was not integrated, but installed in the golden image as an application. When applying the golden image, the above mentioned error occurred. Luckily, this thread came up with the resolution to comment out false located in the unattend.xml file in the %deployroot%control folder.

Windows 91
article thumbnail

Do You Have Contributions To Make To National Security? Attend 18-19 Sep 2014 Intelligence and National Security Summit

CTOvision

'By Bob Gourley. The inaugural Intelligence and National Security Summit will occur September 18-19 2014 at the Omni Shoreham Hotel in Washington DC. Two of the most highly regarded professional organizations in the national security ecosystem have combined to facilitate this event: the Armed Forces Communications and Electronics Association ( AFCEA ) and the Intelligence and National Security Alliance ( INSA ).

Security 275
article thumbnail

The Ten Most Common Cooling Mistakes Data Center Operators Make

Data Center Knowledge

'Two data center cooling experts list things you’re probably doing wrong and paying for in wasted energy. Read More.

article thumbnail

A Heat Template for Docker Containers

Scott Lowe

'In this post, I’ll share a simple template for deploying Docker containers in an OpenStack environment using Heat. Given that Docker is targeted at application deployment, then I felt that using Heat was a more appropriate way of leveraging Docker in an OpenStack environment as opposed to treating Docker as a form of a hypervisor. Later in this post, I’ll compare this approach to using a more container-aware solution such as fleet.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

PowerShell: Transferring data between user profiles

Mick's IT Blog

'Sometimes when you use USMT, it fails for one reason or another. This script is here to transfer user files from one profile to another. It was written so that in the event USMT fails, there is still a means to automate the transfer of user data. The first step is to login as the end user, or have then login, on the new machine. They can log right back out.

Data 80
article thumbnail

A Users Guide To CTOvision Pro

CTOvision

'By Bob Gourley. CTOvision Pro is a subscription based research and analysis service that provides information you can not get from any other source (if you have not tried it yet you may sign up for a free evaluation trial here ). . This post provides tips on how to make the most of this information resource. We start with some general advice then provide info based on the two key user roles in our domain: technology creator and technology consumer.

CTO 260
article thumbnail

Rackspace Expanding Data Center Capacity Globally

Data Center Knowledge

'As it builds in Europe, the company is also expanding in multiple U.S. markets and eyeing additional capacity in Asia Pacific. Read More.

article thumbnail

CoreOS Continued: etcd

Scott Lowe

'In this post, I’m going to build on my earlier introduction to CoreOS by taking a slightly more detailed look at etcd. etcd is a distributed key-value store (more on that in a moment) and is one of the key technologies that I feel distinguishes CoreOS from other Linux distributions. etcd is not, of course, the only distributed key-value store in town.

Linux 65
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

It’s not Shadow IT, it’s Shadow Innovation

A Screw's Loose

'We all hear about shadow IT. It’s a scary term, brought up in articles and conversations. It’s defined as people going around the rules and policies of IT or implementing technology outside of IT’s purview. It’s used by a lot of vendors to point out what can be going wrong in a company. Normally they [.].

article thumbnail

Personal Data Out in the Open

CTOvision

'By Katie Kennedy. What you did not know about your personal data? Reddit, Imgur, Twitch, and a couple other major internet portals are about to hand over reams and reams of user data to university professors to do research on. How can the sites do it while still maintaining users’ trust? Earlier this summer, Facebook ran into trouble with just that, when it came out that the company was altering users’ newsfeeds in order to experiment on them.

Data 258
article thumbnail

Data Center Design: Customization vs. Personalization

Data Center Knowledge

'As data center requirements continue to grow, so will the corresponding need for quickly implementable, reliable solutions, writes Chris Crosby of Compass Datacenters. Read More.

article thumbnail

How to Integrate the Art and Science of Creativity into the Organization

Future of CIO

A creative environment is a place where the humility is appreciated, the curiosity is encouraged, and the creative thinking is rewarded. We are all born to be creative, and today’s knowledge workforce has an absolutely scientific trait as well. You can no longer afford to just talk about creativity and innovation; you must do it. You have to walk the talk and shape the working environment to inspire the purpose and unleash the genius of your employees.

How To 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Mobile first isn’t mobile only

A Screw's Loose

'One of the people I follow has a favorite tweet. Basically it says the only way to win in the enterprise is to go mobile first and mobile only. It’s a great saying and many people agree it’s the right strategy, and yet, they take the phrase word for word and don’t understand why it [.].

Mobile 72
article thumbnail

UPS Data Breach

CTOvision

'Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. In a recent report, the company actually lowered its earnings forecasts for the second half of the year.

Data 255
article thumbnail

Report: UIG Building Apple Data Center in Curaçao

Data Center Knowledge

'Developer behind Reno Technology Park building Apple''s next facility in Dutch island nation in the Caribbean. Read More.

Apple 254
article thumbnail

Innovating by Questioning

Future of CIO

" You can't solve a problem on the same level that it was created. You have to rise above it to the next level." - Albert Einstein Innovation is the new way to do things; innovation creates change to the next level of performance. However, innovation management cannot be a one person challenge and needs careful planning, recruitment, and support to cover everything from fundamental research through experimentation, evaluation, and exploitation.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BYOD, or really BYOP – Bring Your Own Plan

A Screw's Loose

'I read an article today on BYOD (Bring your own device) and how the whole concept could be in trouble. It’s nothing new to see BYOD being seen as the next big thing or for it to be fading away depending on whom you’re talking to. In this case the post was pointing out a [.].

article thumbnail

Data Analytics 2014: Jeff Jonas and the Advantages of More Data

CTOvision

'By Shannon Perry. On July 30 th in northern Virginia, some of the greatest minds in analytics for business, outcomes, and mission impact gathered to share their lessons learned and experiences with data analytics. Academia, government, and industry came together to provide a comprehensive approach to investigating how we can better extract knowledge from information.

Data 255
article thumbnail

Software-Defined Networking: Beyond the Hype

Data Center Knowledge

'For quite some time, software-defined networking (SDN) has been a white whale for many IT pros, writes Patrick Hubbard of SolarWinds. But it’s only a matter of time before SDN becomes a mainstream technology. Read More.

Software 206
article thumbnail

VCDX Study Lounge on Sunday at VMworld SF

Nutanix

If you are preparing for your VCDX examination, or even just interested in getting started, Nutanix invites you to come by the VCDX Study Lounge on Sunday at VMworld 2014 in San Francisco.

Study 20
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.